Rex library for dealing with Powershell Scripts
☆53Aug 4, 2025Updated 6 months ago
Alternatives and similar repositories for rex-powershell
Users that are interested in rex-powershell are comparing it to the libraries listed below
Sorting:
- Exfiltrate blind remote code execution output over DNS via Burp Collaborator.☆12Apr 26, 2020Updated 5 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- ☆11Oct 23, 2019Updated 6 years ago
- Yet Another SMB PSEXEC (Y.A.S.P) Tool☆22Nov 2, 2013Updated 12 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- This tool allows you to stealthily inject a DLL into a process.☆14Jul 11, 2015Updated 10 years ago
- This script is used for extracting DDE in docx and xlsx☆12Dec 8, 2017Updated 8 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆19Nov 14, 2018Updated 7 years ago
- ☆17Oct 25, 2018Updated 7 years ago
- Use to generate DLL through Visual Studio☆20Jul 24, 2017Updated 8 years ago
- A Metasploit module which allows authenticated database users to perform command execution of PostgreSQL 9.3 > Latest Version☆14May 8, 2019Updated 6 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago
- Recurrent neural networks in predicting security exploits☆22Sep 22, 2016Updated 9 years ago
- shell over ICMP☆19Dec 8, 2012Updated 13 years ago
- ☆22Jan 7, 2021Updated 5 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- Hide Mimikatz From Process Lists☆20Jul 10, 2015Updated 10 years ago
- CVE-2018-3252-PoC☆74Dec 7, 2018Updated 7 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last week
- rdp2tcp is a tunneling tool on top of remote desktop protocol (RDP). It uses RDP virtual channel capabilities to multiplex several ports …☆41Jun 26, 2017Updated 8 years ago
- Citrix ADC从权限绕过到RCE☆45Jul 12, 2020Updated 5 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- InsecurePowerShellHost is a .NET Core host process for InsecurePowerShell, a version of PowerShell Core v6.0.0 with key security features…☆31Dec 19, 2017Updated 8 years ago
- A set of OVAL Definitions that provides a simple way to test the capability of OVAL Definition Evaluators.☆26Jun 3, 2016Updated 9 years ago
- POP3 MITM example☆27Dec 12, 2019Updated 6 years ago
- The NIST Open Access to Research (OAR) Public Data Repository (PDR) system software☆14Jan 4, 2026Updated last month
- 群晖使用钉钉机器人做消息通知☆10Jun 9, 2020Updated 5 years ago
- Generate AWS Lambda environment zip files for use by cisagov/domain-scan☆12Oct 11, 2023Updated 2 years ago
- Various C# projects for offensive security☆111Nov 14, 2019Updated 6 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- Process Hollowing Packer☆29Sep 5, 2017Updated 8 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- ☆83Jan 25, 2017Updated 9 years ago
- ☆39Oct 8, 2019Updated 6 years ago
- An example of a downloader written in NodeJS.☆24Apr 17, 2021Updated 4 years ago
- ☆78Feb 19, 2017Updated 9 years ago
- A C# DLL to Dump LSA Secrets☆58Feb 5, 2018Updated 8 years ago